2.023 - Standard user accounts must only have Read permissions to the Winlogon registry key. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
3.030 - Anonymous access to the registry must be restricted. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.005 - Unapproved Users have access to Debug programs. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.009 - Unauthorized users are granted right to Act as part of the operating system. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.027 - Only administrators responsible for the system must have Administrator rights on the system. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
APPL-13-002069 - The macOS system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | DISA STIG Apple macOS 13 v1r3 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - group | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - group | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - user | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - user | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | ACCESS CONTROL |
DTOO201 - Office System - Connection verification of permissions must be enforced. | DISA STIG Office System 2010 v1r12 | Windows | ACCESS CONTROL |
GOOG-12-012200 - Google Android 12 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)]. | MobileIron - DISA Google Android 12 COPE v1r1 | MDM | ACCESS CONTROL |
GOOG-12-012200 - Google Android 12 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)]. | AirWatch - DISA Google Android 12 COPE v1r1 | MDM | ACCESS CONTROL |
GOOG-13-012200 - Google Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)] - for example, USB]. | MobileIron - DISA Google Android 13 COPE v1r1 | MDM | ACCESS CONTROL |
GOOG-13-012200 - Google Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)] - for example, USB]. | AirWatch - DISA Google Android 13 COPE v1r1 | MDM | ACCESS CONTROL |
GOOG-13-012200 - Google Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)] - for example, USB]. | MobileIron - DISA Google Android 13 COBO v1r1 | MDM | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
MSFT-11-005200 - The mobile operating system must allow only the Administrator (MDM) to perform the following management function: Enable/disable location services. | AirWatch - DISA Microsoft Android 11 COPE v1r1 | MDM | ACCESS CONTROL |
WBSP-AS-000240 - The WebSphere Application Server users in a LDAP user registry group must be authorized for that group. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | ACCESS CONTROL |
WINRG-000001 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
WN22-00-000170 - Windows Server 2022 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-DC-000010 - Windows Server 2022 must only allow administrators responsible for the domain controller to have Administrator rights on the system. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-DC-000080 - Windows Server 2022 Active Directory SYSVOL directory must have the proper access control permissions. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-DC-000350 - Windows Server 2022 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-MS-000060 - Windows Server 2022 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-MS-000130 - Windows Server 2022 Enable computer and user accounts to be trusted for delegation user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-UR-000010 - Windows Server 2022 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-UR-000040 - Windows Server 2022 back up files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-UR-000060 - Windows Server 2022 create a token object user right must not be assigned to any groups or accounts. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |
WN22-UR-000070 - Windows Server 2022 create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2022 STIG v1r4 | Windows | ACCESS CONTROL |